Co-author

Journals and Conferences

We introduce a real-time, node-based anomaly detection algorithm that observes the arrival processes experienced by a sensor node. Sensor nodes are resource constrained from many aspects. However… (More)

The performance of RFID MAC algorithms is expressed in terms of the total time it takes by a reader to read all the tags in the reading range. One of the major MAC approaches for RFID systems is the… (More)

In this paper we introduce a detection based security scheme for wireless sensor networks. Although sensor nodes have low computation and communication capabilities, they have specific properties… (More)

This paper introduces a new medium access control (MAC) protocol for passive Radio Frequency Identification (RFID) systems. The protocol is designed as an enhancement to framed slotted ALOHA MAC… (More)